MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c7b031f4548d4f90f20876b89665e739bc7d2ec3136280abd706db7661f4e3f2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: c7b031f4548d4f90f20876b89665e739bc7d2ec3136280abd706db7661f4e3f2
SHA3-384 hash: 943e3328f554c971dcecad595d8640f89a1a19bc4b444f866a640aafd206158018539062098b8313fc075b8c3aee6b3a
SHA1 hash: 4cb5147df09d2c439b5ee3269cae34c3ca73ba64
MD5 hash: 5a8338cb010a7c85c30cecd2df24c7f7
humanhash: purple-bluebird-lamp-wisconsin
File name:likub15.cab
Download: download sample
Signature IcedID
File size:212'992 bytes
First seen:2020-08-18 19:22:33 UTC
Last seen:2020-08-18 20:12:14 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 4153a4da411495ad3c0fffa68826bf9e (7 x IcedID)
ssdeep 3072:ashbGcgGwEKwqUFl1NepH4ESC49VyuTiR+1HniHg+FB97+LdlaTivD:UEKwqU4YESXy8g+1CHg+FB90la+L
Threatray 584 similar samples on MalwareBazaar
TLSH 9F246D00B6A0C038F9BB41BDB5B68B9C652C3E715BAC95CF52D22A9A07746F4ED31353
Reporter malware_traffic
Tags:dll IcedID Shathak TA551

Intelligence


File Origin
# of uploads :
2
# of downloads :
159
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a custom TCP request
Threat name:
Win32.Trojan.IcedID
Status:
Malicious
First seen:
2020-08-18 19:24:07 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments